| File name: | c424ae2e0e7fbe842e8ce8e0c2d36551ce718cda8df23a07b0af790145fcf554.exe |
| Full analysis: | https://app.any.run/tasks/0dcbe936-adee-41de-84f5-fe79b8b2af4e |
| Verdict: | Malicious activity |
| Threats: | GuLoader is an advanced downloader written in shellcode. It’s used by criminals to distribute other malware, notably trojans, on a large scale. It’s infamous for using anti-detection and anti-analysis capabilities. |
| Analysis date: | December 02, 2024, 13:56:42 |
| OS: | Windows 11 Professional (build: 22000, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections |
| MD5: | BCDA7DFE98C66A21374A3EAC66703F68 |
| SHA1: | E2113B5764F2FC16C4E1FCAE6A214DA4D4BB37EB |
| SHA256: | C424AE2E0E7FBE842E8CE8E0C2D36551CE718CDA8DF23A07B0AF790145FCF554 |
| SSDEEP: | 24576:2wmoE1e1HIls6IsTReijbsgtafXKp3PEfMMU0L34Wzg1T+yueg7UBdT:2NoE1e1HIls6IsTReIbsgtafXO3PEfM7 |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2013:12:25 05:01:44+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 25088 |
| InitializedDataSize: | 186368 |
| UninitializedDataSize: | 2048 |
| EntryPoint: | 0x3229 |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 2.0.0.0 |
| ProductVersionNumber: | 2.0.0.0 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | autonitridation damme deckedout |
| FileDescription: | boraginaceae cotylosaur enkeltbrugeres |
| LegalTrademarks: | frankofil canadianisms |
| OriginalFileName: | trikolores.exe |
| ProductName: | nontentatively |
| ProductVersion: | 2.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1568 | "powershell.exe" -windowstyle minimized "$Heksekedlers=Get-Content -Raw 'C:\Users\admin\AppData\Roaming\postarmistice\monospermy\brevbombe\Wynds\Geobotanisk.Con';$Escapisms=$Heksekedlers.SubString(73017,3);.$Escapisms($Heksekedlers)" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | c424ae2e0e7fbe842e8ce8e0c2d36551ce718cda8df23a07b0af790145fcf554.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1620 | \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1656 | C:\Windows\system32\svchost.exe -k NetworkService -p | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.22000.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4468 | "C:\Users\admin\AppData\Local\Temp\c424ae2e0e7fbe842e8ce8e0c2d36551ce718cda8df23a07b0af790145fcf554.exe" | C:\Users\admin\AppData\Local\Temp\c424ae2e0e7fbe842e8ce8e0c2d36551ce718cda8df23a07b0af790145fcf554.exe | explorer.exe | ||||||||||||
User: admin Company: autonitridation damme deckedout Integrity Level: MEDIUM Description: boraginaceae cotylosaur enkeltbrugeres Exit code: 4294967295 Modules
| |||||||||||||||
| 7244 | "C:\Windows\system32\taskmgr.exe" /7 | C:\Windows\System32\Taskmgr.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Manager Exit code: 3221226540 Version: 10.0.22000.184 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7312 | "C:\Windows\system32\taskmgr.exe" /7 | C:\Windows\System32\Taskmgr.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Manager Exit code: 0 Version: 10.0.22000.184 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7452 | "C:\Windows\SysWOW64\msiexec.exe" | C:\Windows\SysWOW64\msiexec.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Version: 5.0.22000.653 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (4468) c424ae2e0e7fbe842e8ce8e0c2d36551ce718cda8df23a07b0af790145fcf554.exe | Key: | HKEY_CURRENT_USER\griffelen\Exchanging |
| Operation: | write | Name: | codal |
Value: FFD1D217 | |||
| (PID) Process: | (1568) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (1568) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (1568) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (1568) powershell.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (7312) Taskmgr.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\TaskManager |
| Operation: | delete value | Name: | Preferences |
Value: | |||
| (PID) Process: | (7312) Taskmgr.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.549981C3F5F10_4.2204.13303.0_x64__8wekyb3d8bbwe%5Cresources.pri\1d89c6c51d0a2c1\e373aa03 |
| Operation: | write | Name: | @{Microsoft.549981C3F5F10_4.2204.13303.0_x64__8wekyb3d8bbwe?ms-resource://Microsoft.549981C3F5F10/Files/Assets/Store/Square150x150Logo.png} |
Value: C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_4.2204.13303.0_x64__8wekyb3d8bbwe\Assets\Store\Square150x150Logo.scale-100.png | |||
| (PID) Process: | (7312) Taskmgr.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.WindowsTerminal_1.14.1963.0_x64__8wekyb3d8bbwe%5Cresources.pri\1d89d3786094c12\e373aa03 |
| Operation: | write | Name: | @{Microsoft.WindowsTerminal_1.14.1963.0_x64__8wekyb3d8bbwe?ms-resource://Microsoft.WindowsTerminal/Files/Images/Square150x150Logo.png} |
Value: C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.14.1963.0_x64__8wekyb3d8bbwe\Images\Square150x150Logo.scale-100.png | |||
| (PID) Process: | (7312) Taskmgr.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MrtCache\C:%5CProgram Files%5CWindowsApps%5CMicrosoft.WindowsTerminal_1.14.1963.0_x64__8wekyb3d8bbwe%5Cresources.pri\1d89d3786094c12\e373aa03 |
| Operation: | write | Name: | @{Microsoft.WindowsTerminal_1.14.1963.0_x64__8wekyb3d8bbwe?ms-resource://Microsoft.WindowsTerminal/Resources/AppName} |
Value: Terminal | |||
| (PID) Process: | (7312) Taskmgr.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CMicrosoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy%5Cresources.pri\1d75a03dbb3ff1\e6fd001b |
| Operation: | write | Name: | @{Microsoft.Windows.StartMenuExperienceHost_10.0.22000.778_neutral_neutral_cw5n1h2txyewy?ms-resource://Microsoft.Windows.StartMenuExperienceHost/StartMenuExperienceHost/PublisherDisplayName} |
Value: Microsoft Corporation | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1568 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ktwexsxc.hsl.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4468 | c424ae2e0e7fbe842e8ce8e0c2d36551ce718cda8df23a07b0af790145fcf554.exe | C:\Users\admin\AppData\Roaming\postarmistice\monospermy\brevbombe\Wynds\Geobotanisk.Con | text | |
MD5:725601690E2A78F984E4FFC448EEF039 | SHA256:7671F74DD24C60AE152B1A2B781F3FB104D811AE853D7238FA3F4363EE0993EB | |||
| 4468 | c424ae2e0e7fbe842e8ce8e0c2d36551ce718cda8df23a07b0af790145fcf554.exe | C:\Users\admin\AppData\Roaming\postarmistice\monospermy\brevbombe\Wynds\Nglestilling.Psy148 | binary | |
MD5:9576A581F7F346E9D8AE69DB6AA2462E | SHA256:ADCE8C2847A3325A280ECE211063820F48DBB7323FC9DE5C305EF6BD4C7F0440 | |||
| 1568 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_d2gpvbv5.c44.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1568 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_0lug3zyh.0vv.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4468 | c424ae2e0e7fbe842e8ce8e0c2d36551ce718cda8df23a07b0af790145fcf554.exe | C:\Users\admin\AppData\Roaming\postarmistice\monospermy\brevbombe\Wynds\kyklopens.omk | abr | |
MD5:C8E4A04215D6E7A2A46B2ECF556E8034 | SHA256:AB50D30AFE30A2B1E868A29CA803681B1A5C0182A1BA8A68E1F7F41C241CFAC2 | |||
| 4468 | c424ae2e0e7fbe842e8ce8e0c2d36551ce718cda8df23a07b0af790145fcf554.exe | C:\Users\admin\AppData\Roaming\postarmistice\monospermy\brevbombe\Wynds\leverancernes.hor | binary | |
MD5:1389593C3437BAED25D4CD0C926898FF | SHA256:9A8D9ED596327751DB6960002DD258066E82BE64080C737D381708446BEB519E | |||
| 4468 | c424ae2e0e7fbe842e8ce8e0c2d36551ce718cda8df23a07b0af790145fcf554.exe | C:\Users\admin\AppData\Roaming\postarmistice\monospermy\brevbombe\Wynds\Stumblebum.uns | abr | |
MD5:89E3C9CE687BCCD3DD422E9CF78E80E7 | SHA256:51F91F8B04620D371417A6A74162ABD8B690909C544F320338B874F3DDAC4BC2 | |||
| 7452 | msiexec.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_841DF67C840691A847835C0F760B4DC0 | der | |
MD5:DCA6FE356CB3304C7923538E7A9E7D5D | SHA256:A732F4F4AEE31C4846CFD164FD286E42894EDDFC24C482EAD32D7A2107892679 | |||
| 7452 | msiexec.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_BB4872F70FE9CD99D6AAFAAAA12FAF2E | der | |
MD5:6D3EBACD6D20B66A7DC2EF4EE8005108 | SHA256:EDAB02C0746E11EC516DEAB55B85DD66EE692430EFFF7B3333DCBF985547A16C | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3592 | firefox.exe | POST | 200 | 2.23.82.57:80 | http://r11.o.lencr.org/ | unknown | — | — | whitelisted |
— | — | GET | 304 | 217.20.57.26:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?55ca73f9206829ff | unknown | — | — | whitelisted |
6340 | MoUsoCoreWorker.exe | GET | 304 | 217.20.57.26:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?2a05bb47fe752fe0 | unknown | — | — | whitelisted |
— | — | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTk45WiKdPUwcMf8JgMC07ACYqr2AQUt2ui6qiqhIx56rTaD5iyxZV2ufQCEAOav%2F2w8K4jHzmTOaTzWTM%3D | unknown | — | — | whitelisted |
— | — | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAo1CNVcKSsBffitZcAP9%2BQ%3D | unknown | — | — | whitelisted |
3556 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
1296 | svchost.exe | GET | 200 | 23.55.161.164:80 | http://www.msftconnecttest.com/connecttest.txt | unknown | — | — | whitelisted |
4720 | SearchHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
4720 | SearchHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
4720 | SearchHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5552 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
— | — | 35.190.72.216:443 | location.services.mozilla.com | — | — | unknown |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
3592 | firefox.exe | 2.23.82.57:80 | r11.o.lencr.org | Akamai International B.V. | DE | whitelisted |
2684 | rundll32.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3592 | firefox.exe | 35.190.72.216:443 | location.services.mozilla.com | GOOGLE | US | unknown |
— | — | 34.120.208.123:443 | — | GOOGLE-CLOUD-PLATFORM | US | unknown |
1948 | OfficeC2RClient.exe | 52.109.89.18:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | unknown |
— | — | 217.20.57.26:80 | ctldl.windowsupdate.com | — | US | whitelisted |
— | — | 192.229.221.95:80 | — | EDGECAST | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
r11.o.lencr.org |
| whitelisted |
location.services.mozilla.com |
| whitelisted |
prod.classify-client.prod.webservices.mozgcp.net |
| unknown |
ctldl.windowsupdate.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
fs.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
cs.dds.microsoft.com |
| whitelisted |
ecs.office.com |
| whitelisted |
mrodevicemgr.officeapps.live.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1296 | svchost.exe | Misc activity | ET INFO Microsoft Connection Test |
1656 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org) |
1656 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Address Lookup Domain (reallyfreegeoip .org) |
7452 | msiexec.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - checkip.dyndns.org |
7452 | msiexec.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - checkip.dyndns.org |
7452 | msiexec.exe | Misc activity | ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI |
1656 | svchost.exe | Misc activity | ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org) |
7452 | msiexec.exe | Device Retrieving External IP Address Detected | ET INFO 404/Snake/Matiex Keylogger Style External IP Check |
7452 | msiexec.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - checkip.dyndns.org |
7452 | msiexec.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup - checkip.dyndns.org |